International Data Encryption Algorithm

Results: 40



#Item
21! finalLogosSNWR-JCLfinv2

! finalLogosSNWR-JCLfinv2

Add to Reading List

Source URL: sni.scholastic.com

Language: English - Date: 2013-07-15 11:58:16
22Microsoft Word - Hosting_Ad_Col.doc

Microsoft Word - Hosting_Ad_Col.doc

Add to Reading List

Source URL: www.ipes.info

Language: English - Date: 2013-10-07 08:27:58
    23Differential cryptanalysis / Lecture Notes in Computer Science / Alternating step generator / Cipher / Summation generator / Cryptanalysis / LOKI / SAFER / International Data Encryption Algorithm / Cryptography / Block ciphers / Data Encryption Standard

    Reference Papers [S1] Biryukov, Shamir, 展agner: Real Time Cryptanalysis of A5/1 on a PC, FSE2000 [S2] Canteaut, Filiol, 鼎iphertext Only Reconstruction of Stream Ciphers based on Combination Generator, FSE2000 [S3] Ch

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-06-19 04:38:45
    24Noekeon Joan Daemen*, Gilles Van Assche*, Michael Peeters* and Vincent Rijmen** *Proton World, Brussels **COSIC, Leuven

    Noekeon Joan Daemen*, Gilles Van Assche*, Michael Peeters* and Vincent Rijmen** *Proton World, Brussels **COSIC, Leuven

    Add to Reading List

    Source URL: gro.noekeon.org

    Language: English - Date: 2013-02-27 15:26:38
    25A CRYPTANALYSIS OF THE TINY ENCRYPTION ALGORITHM

    A CRYPTANALYSIS OF THE TINY ENCRYPTION ALGORITHM

    Add to Reading List

    Source URL: www.csshl.net

    Language: English - Date: 2011-10-26 10:07:40
    26© 2002 Springer-Verlag. Reprinted with permission from M. Glesner, P. Zipf, and M. Renovell (editors), Proceedings of the 12th Conference on Field-Programmable Logic and Applications (FPL[removed]Montpellier, France, 2-4 September 2002, pages[removed].

    © 2002 Springer-Verlag. Reprinted with permission from M. Glesner, P. Zipf, and M. Renovell (editors), Proceedings of the 12th Conference on Field-Programmable Logic and Applications (FPL[removed]Montpellier, France, 2-4 September 2002, pages[removed].

    Add to Reading List

    Source URL: lib.tkk.fi

    Language: English - Date: 2005-03-11 06:00:00
    27On the 2ROT13 Encryption Algorithm ak, #mum cryptolabs April 1, 2005

    On the 2ROT13 Encryption Algorithm ak, #mum cryptolabs April 1, 2005

    Add to Reading List

    Source URL: phoenix.clifford.at

    Language: English - Date: 2005-04-01 02:29:25
    281  New Weak-Key Classes of IDEA

    1 New Weak-Key Classes of IDEA

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English
    29Serpent: A Proposal for the Advanced Encryption Standard Ross Anderson1

    Serpent: A Proposal for the Advanced Encryption Standard Ross Anderson1

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2006-07-27 07:39:15
    301  Improved SQUARE Attacks Against

    1 Improved SQUARE Attacks Against

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English